CVE-2008-4478 – Novell eDirectory Core Protocol Opcode 0x0F Heap Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2008-4478
Multiple integer overflows in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.73 before 8.7.3.10 ftf1, allow remote attackers to execute arbitrary code via a crafted (1) Content-Length header in a SOAP request or (2) Netware Core Protocol opcode 0x0F message, which triggers a heap-based buffer overflow. Múltiples desbordamientos de entero en dhost.exe en Novell eDirectory v8.8 anterior a v8.8.3, y v8.73 anterior a v8.7.3.10 ftf1, permite a atacantes remotos ejecutar código de su elección a través de (1) una cabecera "Content-Length" manipulada en una petición SOAP o (2) mediante un mensaje Netware Core Protocol opcode 0x0F, que lanza un desbordamiento de búfer basado en montículo. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell eDirectory Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within dhost.exe, the service responsible for directory replication which is bound by default to TCP port 524. Improper parsing within opcode 0x0F via the Netware Core Protocol can result in an arithmetic calculation based on supplied user-input resulting in an integer overflow that will be used to copy into a heap buffer. • http://secunia.com/advisories/32111 http://securityreason.com/securityalert/4406 http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7000087&sliceId=1&docTypeID=DT_TID_1_1&dialogID=78066829&stateId=0%200%2078062953 http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7001184&sliceId=1&docTypeID • CWE-189: Numeric Errors •
CVE-2008-4047
https://notcve.org/view.php?id=CVE-2008-4047
Unspecified vulnerability in Novell Forum (formerly SiteScape Forum) 7.0, 7.1, 7.2, 7.3, and 8.0 allows remote attackers to execute arbitrary TCL code via a modified URL. NOTE: this might overlap CVE-2007-6515. Vulnerabilidad no especificada en Novell Forum (formalmente SiteScape Forum) 7.0, 7.1, 7.2, 7.3, y 8.0 que permite a los atacantes remotos ejecutar arbitrariamente código TCL a través de una URL modificada. NOTA: debería sobreescribir la vulnerabilidad CVE-2007-6515. • http://download.novell.com/Download?buildid=6k-5X-UPnrM~ http://secunia.com/advisories/31578 http://www.securityfocus.com/bid/30909 http://www.securitytracker.com/id?1020803 http://www.vupen.com/english/advisories/2008/2465 https://exchange.xforce.ibmcloud.com/vulnerabilities/45199 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2007-6716 – kernel: dio: zero struct dio with kzalloc instead of manually
https://notcve.org/view.php?id=CVE-2007-6716
fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test. fs/direct-io.c del subsistema dio del núcleo de Linux anterior a 2.6.23, no suprime de forma correcta la estructura dio, esto permite a usuario locales provocar una denegación de servicio (OOPS), como se ha demostrado en determinados test fio. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=848c4dd5153c7a0de55470ce99a8e13a63b4703f http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html http://lkml.or •
CVE-2008-2436
https://notcve.org/view.php?id=CVE-2008-2436
Multiple heap-based buffer overflows in the IppCreateServerRef function in nipplib.dll in Novell iPrint Client 4.x before 4.38 and 5.x before 5.08 allow remote attackers to execute arbitrary code via a long argument to the (1) GetPrinterURLList, (2) GetPrinterURLList2, or (3) GetFileList2 function in the Novell iPrint ActiveX control in ienipp.ocx. Múltiples desbordamientos de búfer basados en pila en la función nipplib.dll de Novell iPrint Client 4.x anteriores a la 4.38 y 5.x anteriores a la 5.08, permite a atacantes remotos ejecutar código arbitrariamente a través de un argumento largo a las funciones (1) GetPrinterURLList, (2) GetPrinterURLList2, o (3) GetFileList2 en el control ActiveX iPrint de Novell en ienipp.ocx. • http://secunia.com/advisories/31370 http://secunia.com/secunia_research/2008-33/advisory http://securityreason.com/securityalert/4228 http://www.securityfocus.com/archive/1/495940/100/0/threaded http://www.securityfocus.com/bid/30986 http://www.securitytracker.com/id?1020806 http://www.vupen.com/english/advisories/2008/2481 https://exchange.xforce.ibmcloud.com/vulnerabilities/44853 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2008-2432
https://notcve.org/view.php?id=CVE-2008-2432
Insecure method vulnerability in the GetFileList method in an unspecified ActiveX control in Novell iPrint Client before 5.06 allows remote attackers to list the image files in an arbitrary directory via a directory name in the argument. Vulnerabilidad de método inseguro en el método GetFileList en un control ActiveX no especificado en Novell iPrint Client anterior a v5.06 permite a atacantes remotos listar los archivos de imagen en un directorio de su elección mediante un nombre de directorio en el argumento. • http://secunia.com/advisories/30667 http://secunia.com/secunia_research/2008-30/advisory http://www.securityfocus.com/bid/30813 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •